Patents by Inventor Joo Beom Yun

Joo Beom Yun has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240108675
    Abstract: The present disclosure relates to a composition for antiobesity, which contains a Gynostemma pentaphyllum tea or a Gynostemma pentaphyllum tea extract as an active ingredient. The composition of the present disclosure, which contains a Gynostemma pentaphyllum tea or a Gynostemma pentaphyllum tea extract as an active ingredient, is effective for preventing, alleviating or treating diabetes, obesity, muscle loss, etc. since it exhibits the efficacy of increasing AMPK activity, promoting beta oxidation, promoting glucose uptake, etc. In addition, since the composition of the present disclosure is derived from a natural product, it can be safely used as a drug, food, etc. without side effects.
    Type: Application
    Filed: November 27, 2023
    Publication date: April 4, 2024
    Applicant: BIONIC TRADING CORPORATION
    Inventors: Joo Myung MOON, Hyung Joong KIM, Jung Eun GWAG, Seung Beom YUN, Tae Young KIM
  • Patent number: 11797688
    Abstract: An apparatus for determining a vulnerability of a deep learning model according to an embodiment includes a converter configured to generate an input image for the deep learning model by transforming an original image selected from an image dataset, a measurer configured to measure neuron coverage of the deep learning model by inputting the input image into the deep learning model, and an inspector configured to detect, based on a prediction result of the deep learning model for a class of the input image and a class of the original image, an error in the prediction result.
    Type: Grant
    Filed: May 26, 2021
    Date of Patent: October 24, 2023
    Assignee: INDUSTRY ACADEMY COOPERATION FOUNDATION OF SEJONG UNIVERSITY
    Inventors: Joo Beom Yun, Ji Hyeon Yu, Hyun Jun Mun
  • Publication number: 20220019675
    Abstract: An apparatus for determining a vulnerability of a deep learning model according to an embodiment includes a converter configured to generate an input image for the deep learning model by transforming an original image selected from an image dataset, a measurer configured to measure neuron coverage of the deep learning model by inputting the input image into the deep learning model, and an inspector configured to detect, based on a prediction result of the deep learning model for a class of the input image and a class of the original image, an error in the prediction result.
    Type: Application
    Filed: May 26, 2021
    Publication date: January 20, 2022
    Inventors: Joo Beom YUN, Ji Hyeon YU, Hyun Jun MUN
  • Publication number: 20220019926
    Abstract: An apparatus for fuzzing firmware according to an embodiment includes an emulator that provides a user mode emulation environment for firmware installed in any Internet of Things (IoT) device, a generator that generates one or more test cases in which at least some of a plurality of pre-set mutation operators are applied to at least one of a plurality of seed files, and an executor that executes mutation-based fuzzing on the firmware in the user mode emulation environment based on the one or more test cases.
    Type: Application
    Filed: May 5, 2021
    Publication date: January 20, 2022
    Inventors: Joo Beom YUN, Hyun Wook KIM, Ju Hwan KIM
  • Patent number: 8800037
    Abstract: A system for an engine for forecasting cyber threats and a method enabling the forecast of a low-level cyber threat and the forecast of a high-level cyber threat using the low-level cyber threat in a hierarchical structure of cyber threats are provided. The system includes a forecast information database which stores forecast information including cyber threat forecast items, a forecast schedule related to the items, forecast simulation information, forecast item hierarchical structure information, time series data on cyber threats, and sample data on cyber threats; a forecast engine core subsystem which forecasts the levels of threats for the cyber threat forecast items having a hierarchical structure using the forecast information stored in the forecast information database; and a forecast engine control interface which receives control commands for the forecast engine core subsystem from a user or external system, and delivers the received control commands to the forecast engine core subsystem.
    Type: Grant
    Filed: June 22, 2010
    Date of Patent: August 5, 2014
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Seung Hyun Paek, In Sung Park, Eun Young Lee, Joo Beom Yun, Ki Wook Sohn, Seok Jin Choi
  • Patent number: 8191149
    Abstract: Provided are a system and method for predicting a cyber threat. The system and method collect various variables and synthetically predict the frequency, dangerousness, possibility, and time of the occurrence of a cyber threat including hacking, a worm/virus, a Denial of Service (DoS) attack, illegal system access, a malicious code, a social engineering attack, system/data falsification, cyber terror/war, weakness exploitation, etc., using a time-series analysis method and a Delphi method, and inform a user in advance of the prediction result, thereby enabling the user to prepare against the cyber threat.
    Type: Grant
    Filed: November 12, 2007
    Date of Patent: May 29, 2012
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Joo Beom Yun, Seung Hyun Paek, In Sung Park, Eun Young Lee, Hyung Geun Oh, Do Hoon Lee
  • Publication number: 20120096552
    Abstract: A system for an engine for forecasting cyber threats and a method enabling the forecast of a low-level cyber threat and the forecast of a high-level cyber threat using the low-level cyber threat in a hierarchical structure of cyber threats are provided. The system includes a forecast information database which stores forecast information including cyber threat forecast items, a forecast schedule related to the items, forecast simulation information, forecast item hierarchical structure information, time series data on cyber threats, and sample data on cyber threats; a forecast engine core subsystem which forecasts the levels of threats for the cyber threat forecast items having a hierarchical structure using the forecast information stored in the forecast information database; and a forecast engine control interface which receives control commands for the forecast engine core subsystem from a user or external system, and delivers the received control commands to the forecast engine core subsystem.
    Type: Application
    Filed: June 22, 2010
    Publication date: April 19, 2012
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Seung Hyun Paek, In Sung Park, Eun Young Lee, Joo Beom Yun, Ki Wook Sohn, Seok Jin Choi
  • Patent number: 7716329
    Abstract: An apparatus and method for detecting anomalous traffic are provided. More particularly, an apparatus and method for detecting anomalous traffic based on entropy of network traffic are provided. The apparatus of detecting anomalous traffic includes: an entropy extraction module for extracting entropy from network traffic; a visualization module for generating an entropy graph based on the entropy; a graph model experience module for updating a graph model for each network attack based on the entropy graph; and an anomalous traffic detection module for detecting anomalous traffic based on the entropy graph and the graph model for each network attack and outputting the detection results to a user. In the apparatus and method, anomalous traffic is detected based on network entropy rather than simple statistics based on the amount of traffic, so that a false alarm rate of the apparatus for detecting anomalous traffic can be reduced.
    Type: Grant
    Filed: April 15, 2008
    Date of Patent: May 11, 2010
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Eun Young Lee, Seung Hyun Paek, In Sung Park, Joo Beom Yun, Ki Wook Sohn
  • Publication number: 20090138590
    Abstract: An apparatus and method for detecting anomalous traffic are provided. More particularly, an apparatus and method for detecting anomalous traffic based on entropy of network traffic are provided. The apparatus of detecting anomalous traffic includes: an entropy extraction module for extracting entropy from network traffic; a visualization module for generating an entropy graph based on the entropy; a graph model experience module for updating a graph model for each network attack based on the entropy graph; and an anomalous traffic detection module for detecting anomalous traffic based on the entropy graph and the graph model for each network attack and outputting the detection results to a user. In the apparatus and method, anomalous traffic is detected based on network entropy rather than simple statistics based on the amount of traffic, so that a false alarm rate of the apparatus for detecting anomalous traffic can be reduced.
    Type: Application
    Filed: April 15, 2008
    Publication date: May 28, 2009
    Inventors: Eun Young LEE, Seung Hyun PAEK, In Sung PARK, Joo Beom YUN, Ki Wook SOHN
  • Publication number: 20080115221
    Abstract: Provided are a system and method for predicting a cyber threat. The system and method collect various variables and synthetically predict the frequency, dangerousness, possibility, and time of the occurrence of a cyber threat including hacking, a worm/virus, a Denial of Service (DoS) attack, illegal system access, a malicious code, a social engineering attack, system/data falsification, cyber terror/war, weakness exploitation, etc., using a time-series analysis method and a Delphi method, and inform a user in advance of the prediction result, thereby enabling the user to prepare against the cyber threat.
    Type: Application
    Filed: November 12, 2007
    Publication date: May 15, 2008
    Inventors: Joo Beom YUN, Seung Hyun PAEK, In Sung PARK, Eun Young LEE, Hyung Geun OH, Do Hoon LEE
  • Publication number: 20070234425
    Abstract: A multistep integrated security management system and method using an intrusion detection log collection engine and a traffic statistic generation engine is disclosed. An intrusion detection log collection engine capable of collecting logs generated from diverse intrusion detection engines and a traffic statistic generation engine collect and transmit analyzed data to a control intermediate management server. The control intermediate management server performs more accurate intrusion detection by relationally analyzing the intrusion detection log information and the traffic statistic information. A control uppermost management server performs an integrated security management on a large-scale group subject to control by performing an integrated analysis on a large-scale group subject to control, and thus can support the large-scale integrated security management efficiently.
    Type: Application
    Filed: June 15, 2006
    Publication date: October 4, 2007
    Inventors: Woonyon Kim, Eun Young Lee, Sang Hoon Lee, Dong Su Nam, Joo Beom Yun, Jong Moon Lee, Miri Joo, Dohoon Lee, Eungki Park